Table of contents
- How malware became the cyber threat it is today
- Testing anti-malware products
- Shoulder surfing via audio frequencies for XBox Live passwords
- How to write Yara rules to detect malware
- Report: HITBSecConf2013 Malaysia
- Using Tshark for malware detection
- 5 questions for the head of a malware research team
- Beyond apps, beyond Android: 2013 mobile threat trends
- Malware analysis on a shoestring budget
- Report: Virus Bulletin 2013
- Digital ship pirates: Researchers crack vessel tracking system
- Exploring the challenges of malware analysis
- Evading file-based sandboxes
- Report: RSA Conference Europe 2013
- Data security to protect PCI data flow